'VOR - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

'VOR

Description:

The challenge: 8 Gbt/s/90,000 phone calls. High speed recorders and ... phone and baby monitor intercepts; government trapdoors; bank deposits over $15K. ... – PowerPoint PPT presentation

Number of Views:23
Avg rating:3.0/5.0
Slides: 31
Provided by: SuzanneS51
Category:
Tags: vor | trapdoors

less

Transcript and Presenter's Notes

Title: 'VOR


1
".VOR"
Surveillance The Fourth Amendment
2
Domestic Surveillance
Privacy has never been absolute Fourth
Amendment requires warrants for
unreasonable searches. - Exclusion rule -
Implicit balance between privacy
and order. - Limits Spying by the
Government
on Americans
3
Comint
UKUSA
30 Nations
20 bn Worldwide
4
Targets
Traditional Espionage
Russia Mid-East
Espionage Against Allies
French, Italians, Israel, Greeks Turks
Japan Trade Negotiations
5
Targets
ctd. . .
Law Enforcement
Narcotics, money laundering,
terrorism, organized crime.
Economic Espionage
Commerce Department/ Office of of Executive
Support.
Leveling The Playing Field. Airbus,
Panavia
6
Targets
ctd. . .
Domestic Politics?
7
Intercepting Data
Commercial Carriers
Internet ISPs and Wiretaps
Packet Sniffers US Advantages
High Frequency Radio
Satellite downlinks Microwaves Covert
sources Undersea cables
8
Intercepting Data
Fiber Optics The End of Wiretap?
9
Processing Data
Origins of Echelon
How it Works
The challenge 8 Gbt/s/90,000 phone calls High
speed recorders and preprocessing. 2.5 Gbt/s
recorders 48 Gbt memory LANs and Satellites
10
How it Works
Dictionary Computers - Keywords Topic
Analysis - Computer Data - Fax - Internet -
Voice
11
Safeguards and Dangers
Safeguards
UKUSA Limitations NSA Statutory
Authority Commercial Use Expense
12
Safeguards and Dangers
Dangers
Secrecy Mission Creep and Seductive
Technologies Organizational Imperatives
What Can Be Done?
13
European Issues
Common Interests With US Domestic law
enforcement Overlap With UKUSA Competing
Programs Economic Competition - Bribes?
14
The End?
Encryption Clipper Chip Hilfsinformationen
- CryptoAG, Microsoft, Netscape
Lotus Hacking Growth of Fiber Optic Networks
More Human Intelligence?
15
Domestic Surveillance
Other Remedies Political and civil sanctions.
16
Today's Ground Rules
What Can Todays Cops Do Without a Warrant? -
Informants Wearing a Wire - Following and
videotaping people. - Seizing
incident to arrest.
17
Today's Ground Rules
Warrants Requirements - Shopping List -
Reasonable Cause - Why its there
and why its relevant. - Minimization -
Intrusiveness Duration
18
Some 4th Amendment History
Early 20th Century Adjunct to 5th 1928
Olmstead Trespassing Analogy 1967 Katz
Subject Reasonable Expectation - The
Circularity Problem - Cell phone and baby
monitor intercepts government
trapdoors bank deposits over
15K. 2001 Kyllo
19
Kyllo v. US
US Supreme Ct. 2001
To withdraw protection of this minimum
expectation would be to permit police technology
to erode the privacy guaranteed by the Fourth
Amendment. Ban is not tied to the quality or
quantity of information obtained.
20
Wiretaps
Historical Abuses World War I The
Twenties DoJ Tries to Set Rules Harlan Stone
bans wiretaps (1924) William Mitchell lifts the
ban (1932) FCC Act (1934) Robert Jackson
FDR (1940) Hoover Bobby Kennedy
21
Wiretaps
Legislation Omnibus Crime Control and Safe
Streets Act (1968) Foreign Intelligence
Surveillance Act (1980s)
22
Wiretaps
Requires A Warrant - Article III Judge -
Least dangerous way to proceed -
Minimization - Judge reviews tapes within 10
days. - Much Harder Than . . . Breaking Down
Doors Wiretap in Europe
23
Seizing Data
Personal Computers Bank Records Warrants,
Federal Grand Jury, Subpoenas. Consumer
Credit Records
24
Carnivore
Design Goals - A Fallback Solution for ISPs
that cant provide real-time intercepts for 30
days at a stretch. - Packet Sniffing
Technology - Control Audit Trail - Chain of
Custody
25
Carnivore
Nuts and Bolts - One Way Ethernet Tap -
Pentium Computer in Locked Space - Phone Line
PC Anywhere - Locked Jazz Disk - Packeteer,
CoolMiner Dragonware
26
Minimization Software Options Message
Type Pen Register Fixed or Dynamic IP
Addresses Trap Trace Full Text Operator
Procedures Discarding Irrelevant Data
Carnivore
27
Carnivore
Safeguards Mechanical - Access to Unit -
Access to Disk Hardware limitations - Cannot
Monitor entire networks - Does not affect ISP
performance - Cannot send or overwrite packets
28
Carnivore
- Passwords - Access to unit - Access to
data files - Access to setting controls -
Audit Functions - Institutional Safeguards -
Who Can Apply for a Wiretap. - Technically
Trained Agents - TTAs
29
Carnivore
Judicial Role - Authorization - Oversight -
Notice to Targets - Criminal and Civil
Sanctions The Exclusion Rule
30
Carnivore
Limitations Vulnerable to encryption,
non-standard protocols. Limited to 60 Mbps
Cannot handle high throughput environments.
Write a Comment
User Comments (0)
About PowerShow.com